From owner-freebsd-security@FreeBSD.ORG Tue Jun 10 00:17:06 2003 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 7126837B401 for ; Tue, 10 Jun 2003 00:17:06 -0700 (PDT) Received: from mailgate.mnemonic.no (mailgate.mnemonic.no [195.18.160.220]) by mx1.FreeBSD.org (Postfix) with ESMTP id 5DA6243F93 for ; Tue, 10 Jun 2003 00:17:05 -0700 (PDT) (envelope-from eal@mnemonic.no) Received: from mnemonic.no (localhost [127.0.0.1]) by mailgate.mnemonic.no (Postfix) with ESMTP id 104578979B; Tue, 10 Jun 2003 09:17:02 +0200 (MEST) Received: from chupacabra.wks.mss.mnemonic.no (chupacabra.wks.mss.mnemonic.no [172.27.3.2]) by mnemonic.no (Postfix) with ESMTP id 8929C418A1; Tue, 10 Jun 2003 09:17:02 +0200 (MEST) Received: by chupacabra.mnemonic.no (Postfix, from userid 123) id 6469B2B2671; Tue, 10 Jun 2003 09:16:52 +0200 (CEST) Date: Tue, 10 Jun 2003 09:16:52 +0200 From: Erik Alexander =?iso-8859-1?Q?L=F8kken?= To: Brett Glass Message-ID: <20030610071652.GJ561@mnemonic.no> References: <200306092254.QAA10240@lariat.org> <200306092254.QAA10240@lariat.org> <4.3.2.7.2.20030610010227.02a68ed0@localhost> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4.3.2.7.2.20030610010227.02a68ed0@localhost> User-Agent: Mutt/1.4i X-System: King of the Road, FreeBSD 4.8-STABLE i386 cc: security@freebsd.org Subject: Re: Removable media security in FreeBSD X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Security issues [members-only posting] List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 10 Jun 2003 07:17:06 -0000 On 10.06 01:04, Brett Glass wrote: > At 05:21 PM 6/9/2003, Doug Barton wrote: > > >On Mon, 9 Jun 2003, Brett Glass wrote: > > > >> Allowing the user to use sudo would effectively be giving him/her root > >> privileges, which we explicitly don't want to do. > > > >No it wouldn't. You can specify the commands that you allow each user to > >run. > > Ah, but letting the user mount and unmount things effectively lets that > person do anything he or she wants, by switching around what's mounted > at key mountpoints. > Or you can limit which mount points the user actually has the privileges to change, in sudoers: %users ALL=/sbin/mount /cdrom,/sbin/umount /cdrom /erik